HackDig : Dig high-quality web security articles for hacker

Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control over them.
The European Consumer Organisation (BEUC) warns that most children’s GPS-tracking smartwatches represent a threat for them. Many devices are affected by security vulnerabilities that could be exploited by

Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai.
The new thing bot emerged at the end of September and appears much more sophisticated, according to the experts the malware already infected more than one million organizations worldwide.
The malicious code tries to exploit many

Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters that addresses a critical vulnerability.
Siemens has just released a firmware update for the 7KT PAC1200 Siemens smart meters to fix a critical vulnerability that can be exploited by remote attackers to bypass authentication and perform administrative actions on the device.

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug.
The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection. T

Experts at security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings.
The most popular thingbot since now is the Mirai, but it isn’t the only one targeting Linux-based internet-of-things (IoT) devices.
Researchers with security firm Doctor Web discovered a new botnet of Io

The latest attack Blueborne is taking over by storm , lets read about it in concise, the attack method and the details of this bug.
A series of vulnerabilities have been unearthed in the implementation of Bluetooth which allows hackers to take over your computers/ tablets/ smartphones whenever Bluetooth is on.
A total of eight critical Bluetooth vulnerabilit

The US-CERT is warning of hackers can remotely access Smiths Medical Syringe Infusion Pumps to control them and kill patients.
IoT devices continue to enlarge our surface of attack, and in some cases, their lack of security can put our lives in danger.
Let’s thinks for example of medical devices that could be hacked by attackers with serious consequenc

WikiLeaks has published a new batch of documents that details the Project Protego, a secret CIA Missile Control System Project for fighters
Another week, another batch of CIA Vault7 leaks was published by Wikileaks. This time the documents provide details about the Project Protego, a CIA Secret Missile Control System.
WikiLeaks published four secret docume

Recently the The FDA and Homeland Security have issued alerts about vulnerabilities in 4,65,000 pacemakers.
The devices can be remotely “hacked” to increase activity or reduce battery life, potentially endangering patients.
Feasible vulnerabilities:
Absence of memory and encryption:
In such embedded devices there is a lack to support proper cryptographic e

Security researchers are warning of the availability online of a list of IoT devices and associated telnet credentials.
The list has been available on Pastebin since June, but last week it was also shared via Twitter by the researcher Ankit Anubhav becoming rapidly viral.
The original list was posted by someone who has previously published a dump of valid lo

What are the pros and cons of AI?
Mark Zuckerberg and Elon Musk have been debating about the future of artificial intelligence (AI) for quite some time. Last month they continued the conversation by making their debate public. During a Q&A session with Nevada’s governor Brian Sandoval, Elon made a few statements about the dangers of AI.
Tesla’s CEO said

Some models of LockState smart locks also used by AirBnB customers were bricked by an OTA firmware update leaving guests unable to access their rentals.
At the last Black Hat hacker conference, security experts demonstrated how to hack electronic locks, and the news I’m going to tell you demonstrates how annoying could be an incident to occurred to hun

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks.
According to a new report from security provider Bitdefender, roughly 175,000 connected security cameras are vulnerable to cyber attacks.
The vulnerable cameras are manufactured by the Chinese company Shenzhen Neo

Earlier this week iRobot CEO Colin Angle shared with Reuters that the data collected by iRobot devices (such as Roomba) over the years may eventually be shared with third parties. Even though iRobot’s robotic vacuum cleaners are not as smart as R2-D2, some of the high-end models, such as the $900 Roomba 980 robotic vacuum cleaner, are known to contain sophis

Experts found a flaw in Humax WiFi Router model HG-100R that could be triggered to fully compromise the devices.
A zero-day vulnerability in Humax WiFi Router model HG-100R could be exploited by attackers to compromise the WiFi credentials and obtain the router console administrative password. Trustwave SpiderLabs researchers discovered.
The issue was found